1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
7

The user location is usually a city

Computers and Technology
1 answer:
castortr0y [4]3 years ago
4 0
What do you mean but I think yes the user location is usually a city
You might be interested in
A sequence of data values separated by commas can be made into a list by enclosing the sequence in what type of symbols?
Dovator [93]

Answer:

square brackets [ ]

Explanation:

In python programming language a list is a data structure type that contains data values which can be of different data types separated by commas and enclosed in a pair of square brackets. in the example below, I have created a list and initialized the values

MyList = [ 2,3,4,5,"David", 2.5, 5.8].

This list contains three different data types integers, float and a string

This code below will produce the output that is attached as an image

<em>MyList = [2,3,4,5,"David"]</em>

<em>print(MyList[0])</em>

<em>print(MyList[1])</em>

<em>print(MyList[2])</em>

<em>print(MyList[3])</em>

<em>print(MyList[4])</em>

<em>Observe that list follow the zero-based indexing</em>

3 0
3 years ago
Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
pashok25 [27]

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

7 0
4 years ago
Is main memory fast or slow?
Snezhnost [94]

Answer:

Slower

Explanation:

7 0
4 years ago
List the steps you took to configure SERVERC and take a screen shot of the Connect to DNS Server dialog box by pressing Alt+Prt
Oksi-84 [34.3K]

Answer: Main Steps are as under;

1. Add servers to the server administrator • On the SVR-MBR-C computer, click All Servers.

2. After installation right click all servers icon, the SVR-MBR-C restarts.

3. On the Active tab and the selected Adatum domain, click Find Now Select the SVR-DC-A server and click the arrow and Search results. The server appears in the selected list.

4. In SVR-MBR-C, in Server Manager, click Manage> Add Roles and Features.

5. The Add Roles and Features Wizard appears, showing before you begin

6. Add AD DS as Roles.

7. 7. Promote the server after adding roles to a domain controller

8. After installation SVR-MBR-C restarts.

Explanation:

Main Steps are as under;

1. Add servers to the server administrator • On the SVR-MBR-C computer, click All Servers.

2. After installation right click all servers icon, the SVR-MBR-C restarts.

3. On the Active tab and the selected Adatum domain, click Find Now Select the SVR-DC-A server and click the arrow and Search results. The server appears in the selected list.

4. In SVR-MBR-C, in Server Manager, click Manage> Add Roles and Features.

5. The Add Roles and Features Wizard appears, showing before you begin

6. Add AD DS as Roles.

7. 7. Promote the server after adding roles to a domain controller

8. After installation SVR-MBR-C restarts.

6 0
4 years ago
People must use telepresence when virtually meeting with a group of co-workers.<br><br> T or F
____ [38]
F) There are many other sites/applications you can use
6 0
4 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • What is the efficiency (Big O Notation) of quicksort algorithm?
    15·1 answer
  • _____ supplement operating system software in ways that increase the security or capabilities of the computer system. firewalls,
    15·1 answer
  • Susan is in charge of the inventory reports for her company.She will need to find specific inventory items as well as project in
    9·1 answer
  • if you are trying to reduce your debt, which of these expenses should you consider cutting out or cutting back on first?
    11·1 answer
  • Work-based learning can be defined as educational experiences that focus on
    11·1 answer
  • In java please
    13·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • OkkKkkkkkEYEYYEYEYEY BYEYYEYEYEyeeyeyyeEYEy if you know you know
    11·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!